Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PRPIFQDGYPQ3F2TF2ETPIL7IYNSVVZQ/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKTNYDBDVJNMVC7QPXQI7CMPLX3USZ2T/ | vendor advisory |
https://lists.horde.org/archives/announce/2020/001285.html | mailing list vendor advisory |
http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html | exploit vdb entry third party advisory |
https://lists.debian.org/debian-lts-announce/2020/04/msg00008.html | third party advisory mailing list |